Navigate This Site

Philip Ramsey Headlines

Saturday, December 10, 2011 update/improvements

philip ramsey - Google+
For the past few weeks I have been on updating, or more accurately, improving The idea for the improvements started back in August when I bought my ASUS Eee Pad aka ANDROID TRANSFORMER tablet. It has two cameras - a back facing high definition camera and a lower resolution front facing camera. I think you know where I am going with this.

Monday, November 21, 2011

Wordpress - the new platform for spreading malware

Index of /wp-content/plugins/extended-comment-options

Lately, I've been receiving spam mail from a compromised Hotmail account that sends out links to compromised Wordpress blogs. Or maybe the Wordpress blogs were setup specifically to redirect visitors to phishing sites that are part of a network.

Monday, October 17, 2011

Sunday, July 3, 2011

Free eBook: How to Monitor Your Social Media Presence .... is the book worth the risk?

I came across this Free eBook: How to Monitor Your Social Media Presence in 10 Minutes a Day and thought it would be great to get. When I clicked on the link, I was presented with a form requesting that all fields be completed including my phone number business information. Because of the recent spate of successful cyber attacks against businesses and governments lately, I immediately checked if the page was encrypted or not.

Thursday, March 24, 2011

2010 CanTax income tax software from CCH - the worst tax software ever!!!

I have been doing personal income tax preparation ever since taking H&R Block's income tax course in the fall of 1988 and worked for H&R Block during the tax season in 1989. Back then I prepared taxes by hand using the tax forms, provided by Revenue Canada, and a pencil. The pencil was necessary as it is easy to erase a mistake when it is written lead.

Wednesday, March 23, 2011

W5: Investigating Canada's big cyber security problem

Computer Security: Principles and PracticeW5's segment on Investigating Canada's big cyber security problem only highlights the tip of the iceberg. In my articles on Wednesday, January 13, 2010 Google vs China - Googles response to attacks by China, Friday, January 15, 2010 Internet Explorer Flaw Implicated in Chinese Attacks and Monday, February 22, 2010 Technology Review: Corporations, agencies infiltrated by 'botnet' I provided my insight into how computer security breaches may be easily avoided - DO NOT USE MICROSOFT PRODUCTS.

Saturday, February 5, 2011

A Job Applicant? Nope, It's A Malware Attack - my comments

In the article "A Job Applicant? Nope, It's A Malware Attack" businesses may avoid the costs and headaches associated with the security issues of Microsoft products, especially Windows security issues, by using open source software and Linux. For true security, the use of x64 (64 bit) Linux is essential. There are many distributions of Linux. Each are developed for specific environments, i.e. business, home, pleasure, multimedia, development, entertainment etc.

Wednesday, February 2, 2011

When an encrypted login is not secure - the security is broken

While attempting to login to your site via I noticed the encryption is broken. Further investigation revealed a stylesheets and a number of scripts that are hosted on Google that are not encrypted. As a company that claims to be concerned with security why are CSS and JS files hosted by Google needed on your login page? Why do you want to give your users credentials to the world's most powerful search engine. I certainly do not want my CCH username and password showing up in Google's search results.